Critical RCE Flaws Found in Flowise AI Platform, Allowing Remote Code Execution

Critical RCE Flaws Found in Flowise AI Platform, Allowing Remote Code Execution Security researchers at JFrog Security Research have uncovered two critical vulnerabilities in Flowise, an open-source generative AI development platform used to build AI agents and LLM workflows. Bot … Read more Published Date: Aug 16, 2025 (7 hours, 3 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-52621 – HCL BigFix SaaS Origin Header Cache Poisoning

The following table lists the changes that have been made to the CVE-2025-52621 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]

CVE-2025-52620 – HCL BigFix XSS Vulnerability in Image Upload Functionality

The following table lists the changes that have been made to the CVE-2025-52620 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]

CVE-2025-52619 – HCL BigFix SaaS Authentication Service Sensitive Information Disclosure

The following table lists the changes that have been made to the CVE-2025-52619 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]

CVE-2025-52618 – HCL BigFix SQL Injection

The following table lists the changes that have been made to the CVE-2025-52618 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]